1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
12

What is the purpose of a report?

Computers and Technology
2 answers:
alukav5142 [94]3 years ago
5 0
The one that makes most sense would be B since a report is based upon returned data
adoni [48]3 years ago
4 0

Answer:

B. To display data returned from a query in a specially formatted way

You might be interested in
Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
Vika [28.1K]

Answer:

Polymorphism

Explanation:

You can have a basic button class that gets inherited by other classes.

class Button {

function pushButton(){}

}

class ElevatorButton extends Button{};

class BigRedButton extends Button{};

With these new classes, they inherit from the basic button class. They can decide what happens when the method pushButton() is called.

You don't need to worry about what pushButton() actually does, you can just call it if the object is of the type "Button" and you can expect it to work.

4 0
2 years ago
There is the Iphone MAX, Iphone XR and Iphone XS. which iphone is the very NEWEST and which one do you recommend? explain.
Pavlova-9 [17]

Answer:me myself would go with the Iphone XR

Explanation:

Because its like a combined phone of those two phones together and its not as exspnsive as the other phones and overall its good cause i have had it since it came out and had no problems with it.

3 0
3 years ago
Read 2 more answers
The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
victus00 [196]

Answer:

The answer is "Option a"

Explanation:

The given question is incomplete, that's why its correct solution can be defined as follows:

The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.  

3 0
3 years ago
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organiza
mixas84 [53]

Based on  mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.

<h3>What is Joint Tactical Operations (JTO) Procedural Handbook?</h3>

This is known to be a book that contains all  the provisions that is needed by system operators along with some technical parameters and tactical procedures.

It is often used  for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.

Learn more about military from

brainly.com/question/525279

6 0
2 years ago
What are strategies that you can use to yield web sites that are relevant to your research topic?
evablogger [386]

Answer: PLEASE MARK BRAINELEIST

Locating Useful Resources

When you chose a paper topic and determined your research questions, you conducted preliminary research to stimulate your thinking. Your research proposal included some general ideas for how to go about your research—for instance, interviewing an expert in the field or analyzing the content of popular magazines. You may even have identified a few potential sources. Now it is time to conduct a more focused, systematic search for informative primary and secondary sources.

5 0
3 years ago
Other questions:
  • What is the opportunity cost of computers when moving from point A to point B? -15 DVDs b. What is the opportunity cost of compu
    13·1 answer
  • A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
    10·1 answer
  • What are the top and side margins for a letter typed in standard format?
    5·1 answer
  • Software that function as an electronic file cabinet
    7·1 answer
  • Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
    10·1 answer
  • Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi
    11·1 answer
  • Attribute variables have the same meaning as participants variables. is this true or false?​
    14·1 answer
  • Your job is to choose a data structure to implement polynomials whose coefficients are positive integers, such as 17x^4+4x^3+0x^
    9·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
  • How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private go
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!